March 28, 2014

25 Reasons Why Cable Technicians Hate You

By JaySlatkin June 13, 2008

It is no secret that we dole out criticism of the cable companies, perhaps, on a daily basis. We thought it might be fair and equitable to learn what cable technicians hate about the customers. We found out about this post written by a cable tech who isn’t afraid to let it fly, “And every once in a while, we get the one customer, and we just fucking hate you,” says “InstallerTechJeff” on Cable Rant Forums. The 25 reasons, inside…

First off I would have to say, I really love being a cable guy. It is a very respectable job, and I have been doing cable for just over 2 years. It’s a decent job with good benefits. I love people. I love being around people. Particularly in the area I work in, I don’t typically have to deal with your everyday morons. Most customers are very happy to see me arrive, and I am usually very happy to meet them as well.

Keep some things in mind though. First of all, we are human beings, and if we at any point realize that there is going to be a substantial amount of work to do in order to get your services up and running, it may and probably will become irritating.

And every once in a while, we get the one customer, and we just fucking hate you.

1. We call you to confirm the appointment and to let you know we’re on the way. We get there. You’re not home, so we leave, and we end up having to come back to do the damn job because you are liars and said you were home, when you weren’t. We are on schedules you asshole. You can wait another day or until the evening to get your shit installed.

2. Your dogs shit everywhere in your yard. Pick that shit up, we have to work in it. Slob.

3. Your dogs shit in your house. Shoot your dog please.

4. Your children are climbing on us. Control them. I for one love kids, and love playing with them but put that bugger in the crib sometimes.

5. Your house smells like ass. Clean up your plates that have plants growing on them now. This bowl that had milk in it is molding and looks like green beans now. It’s gross. Pick up your shitty diapers, and spray some air freshener or I’m coming back in with a surgical mask on (yes we have those), and I would prefer not to hurt your feelings.

6. Your router. Do it your damn self.

7. Offer us a drink, it’s hot, we’re probably going out of our way to make sure your shit works!

8. We’re not going to assemble your piece of crap computer! We’re not going to fix it either, we’re the cable company, not Geek Squad.

9. We’re not there to set up your surround sound system. We are not Circuit City.

10. MOVE YOUR CRAP OUT OF THE WAY!!! If we have to access your attic to change splitter configurations (or to do a wallfish), move your own shit out of the way, it’s not our job to move your boxes and luggage in your closet. We’re not Mayflower or any other moving company. In fact we’re not there to move any furniture, electronics, computers, clothing, boxes, etc. IF ANYTHING HAS TO BE MOVED, YOU NEED TO MOVE IT OR YOU DON’T GET YOUR CABLE. If we break something we have to pay for it. Here’s a solution, move your shit before we get there (ie. dressers, entertainment centers — move these AWAY from cable and AC outlets, so we have access)

11. If you are ordering Internet make sure you have a computer there for us to test it on when we arrive. common sense.

12. If you are ordering digital phone, you don’t need a phone there (we have test phones), but don’t expect us to run 3 phone outlets for free. the sh*t aint happening.

13. If your installation has to get rescheduled, don’t flip out. Its not our fault your drop got cut and has to be road-bored, and we are only adhering to our companies policies.

14. You don’t get a new box every time a new one comes out. That’s not how it works. They are all designed to do the same thing. If there’s a problem we’ll replace it, but don’t waste our time.

15. YOUR INTERNET IS NOT SLOW, YOUR COMPUTER IS!!! Take a few weeks to learn about how computers work. It’s important nowadays because computers rule the world right now. 95% of the time, if the internet is slow, your computer either has too much porn/spyware/adware/virus, etc to properly function. Run the recovery disk or fix it otherwise. Because if the signal levels are correct, your internet is going to be fast. modems usually don’t just go bad.

16. Dogs – A lot of us love animals but put those bitches up if they bite. It’s not funny. That’s why so many of my teammates hate dogs!! I love them, and most other animals but some of you idiots don’t train your animals. Put the mean ones away somewhere (preferably somewhere that is not important to the cable installation).

17. Put some damn clothes on. It was your choice for you to have us there at 8am, not ours. I’d rather be sleeping still. So get your ass up.

18. Coax wiring — don’t try to do it yourself, because you probably don’t know what youre doing. Radio Shack and Wal-Mart coax cable sucks. It’s usually RG-59 equivalent and is good for nothing. We use RG-6 or better. and the connectors, and dielectric/outer sheet layer differences on our cable make worlds of difference. Thanks for trying to help, but trust us on this one.

19. If your house is over 450 feet from the tap (or pole) don’t expect premium services (digital cable, internet, or digital phone) to work well, if they work at all. You probably shouldnt even have cable.

20. If you are ordering digital cable, make sure you have a working TV there for us to test it on when we arrive.

21. Contractors are hard workers, but there are bad eggs everywhere (contractors & in-house alike). Some of us were contractors before we worked directly for the company! Don’t hate!

22. Don’t get an attitude, when speaking to the tech, unless the tech has one first.

23. We physically CANNOT give you free HBO. your set-top box is provisioned from the office, not from your house.
This request, although typically offered for humor-purposes, is getting old.

24. THERE IS NO CABLE SWITCH. YOUR CABLE IS NOT TURNED ON WITH ANY TYPE OF SWITCH OR SIMILAR DEVICE. IN FACT: Less than 1% of my jobs are connected properly with good parts where I only have to connect it at the tap. We almost always have to tone outlets out, sometimes run new ones, scrub old ones, add equipment to your account, correct job codes, etc.

25. If we are not assigned your installation, we do NOT want to pick it up early. Unless the tech is VERY bored with no other work, he will probably not want to do it early, don’t ask.

And finally. If you feel like we did a good job AT LEAST let us know, and gratuity is nice too. You tip the Pizza man and wait staff at a restaurant right? Well they are just doing their job, and if they are nice and give you the service you want, you tip them. We work harder for our money, and we are way underpaid too, so don’t be shy!! We remember these things!

We don’t expect $50 or anything crazy like that, in fact we don’t expect anything, but if we have to spend 3 or 4 hours crawling your house to rewire it, and hang a new aerial drop just so you can have service. Come on. And be nice to the service/repair techs too!! They have WAY more experience and they have to work just as hard (or harder) to fix an issue the installer left behind.

Permalink • Print • Comment

July 27, 2013

How Microsoft handed the NSA access to encrypted messages

 

• Secret files show scale of Silicon Valley co-operation on Prism
• Outlook.com encryption unlocked even before official launch
• Skype worked to enable Prism collection of video calls
• Company says it is legally compelled to comply

 
 
Skype logo

Skype worked with intelligence agencies last year to allow Prism to collect video and audio conversations. Photograph: Patrick Sinkel/AP

Microsoft has collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption, according to top-secret documents obtained by the Guardian.

The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.

The documents show that:

• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;

• The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;

• The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;

• Microsoft also worked with the FBI’s Data Intercept Unit to “understand” potential issues with a feature in Outlook.com that allows users to create email aliases;

• In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of Skype video calls being collected through Prism;

• Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a “team sport”.

The latest NSA revelations further expose the tensions between Silicon Valley and the Obama administration. All the major tech firms are lobbying the government to allow them to disclose more fully the extent and nature of their co-operation with the NSA to meet their customers’ privacy concerns. Privately, tech executives are at pains to distance themselves from claims of collaboration and teamwork given by the NSA documents, and insist the process is driven by legal compulsion.

In a statement, Microsoft said: “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” The company reiterated its argument that it provides customer data “only in response to government demands and we only ever comply with orders for requests about specific accounts or identifiers”.

In June, the Guardian revealed that the NSA claimed to have “direct access” through the Prism program to the systems of many major internet companies, including Microsoft, Skype, Apple, Google, Facebook and Yahoo.

Blanket orders from the secret surveillance court allow these communications to be collected without an individual warrant if the NSA operative has a 51% belief that the target is not a US citizen and is not on US soil at the time. Targeting US citizens does require an individual warrant, but the NSA is able to collect Americans’ communications without a warrant if the target is a foreign national located overseas.

Since Prism’s existence became public, Microsoft and the other companies listed on the NSA documents as providers have denied all knowledge of the program and insisted that the intelligence agencies do not have back doors into their systems.

Microsoft’s latest marketing campaign, launched in April, emphasizes its commitment to privacy with the slogan: “Your privacy is our priority.”

Similarly, Skype’s privacy policy states: “Skype is committed to respecting your privacy and the confidentiality of your personal data, traffic data and communications content.”

But internal NSA newsletters, marked top secret, suggest the co-operation between the intelligence community and the companies is deep and ongoing.

The latest documents come from the NSA’s Special Source Operations (SSO) division, described by Snowden as the “crown jewel” of the agency. It is responsible for all programs aimed at US communications systems through corporate partnerships such as Prism.

The files show that the NSA became concerned about the interception of encrypted chats on Microsoft’s Outlook.com portal from the moment the company began testing the service in July last year.

Within five months, the documents explain, Microsoft and the FBI had come up with a solution that allowed the NSA to circumvent encryption on Outlook.com chats

A newsletter entry dated 26 December 2012 states: “MS [Microsoft], working with the FBI, developed a surveillance capability to deal” with the issue. “These solutions were successfully tested and went live 12 Dec 2012.”

Two months later, in February this year, Microsoft officially launched the Outlook.com portal.

Another newsletter entry stated that NSA already had pre-encryption access to Outlook email. “For Prism collection against Hotmail, Live, and Outlook.com emails will be unaffected because Prism collects this data prior to encryption.”

Microsoft’s co-operation was not limited to Outlook.com. An entry dated 8 April 2013 describes how the company worked “for many months” with the FBI – which acts as the liaison between the intelligence agencies and Silicon Valley on Prism – to allow Prism access without separate authorization to its cloud storage service SkyDrive.

The document describes how this access “means that analysts will no longer have to make a special request to SSO for this – a process step that many analysts may not have known about”.

The NSA explained that “this new capability will result in a much more complete and timely collection response”. It continued: “This success is the result of the FBI working for many months with Microsoft to get this tasking and collection solution established.”

A separate entry identified another area for collaboration. “The FBI Data Intercept Technology Unit (DITU) team is working with Microsoft to understand an additional feature in Outlook.com which allows users to create email aliases, which may affect our tasking processes.”

The NSA has devoted substantial efforts in the last two years to work with Microsoft to ensure increased access to Skype, which has an estimated 663 million global users.

One document boasts that Prism monitoring of Skype video production has roughly tripled since a new capability was added on 14 July 2012. “The audio portions of these sessions have been processed correctly all along, but without the accompanying video. Now, analysts will have the complete ‘picture’,” it says.

Eight months before being bought by Microsoft, Skype joined the Prism program in February 2011.

According to the NSA documents, work had begun on smoothly integrating Skype into Prism in November 2010, but it was not until 4 February 2011 that the company was served with a directive to comply signed by the attorney general.

The NSA was able to start tasking Skype communications the following day, and collection began on 6 February. “Feedback indicated that a collected Skype call was very clear and the metadata looked complete,” the document stated, praising the co-operation between NSA teams and the FBI. “Collaborative teamwork was the key to the successful addition of another provider to the Prism system.”

ACLU technology expert Chris Soghoian said the revelations would surprise many Skype users. “In the past, Skype made affirmative promises to users about their inability to perform wiretaps,” he said. “It’s hard to square Microsoft’s secret collaboration with the NSA with its high-profile efforts to compete on privacy with Google.”

The information the NSA collects from Prism is routinely shared with both the FBI and CIA. A 3 August 2012 newsletter describes how the NSA has recently expanded sharing with the other two agencies.

The NSA, the entry reveals, has even automated the sharing of aspects of Prism, using software that “enables our partners to see which selectors [search terms] the National Security Agency has tasked to Prism”.

The document continues: “The FBI and CIA then can request a copy of Prism collection of any selector…” As a result, the author notes: “these two activities underscore the point that Prism is a team sport!”

In its statement to the Guardian, Microsoft said:

We have clear principles which guide the response across our entire company to government demands for customer information for both law enforcement and national security issues. First, we take our commitments to our customers and to compliance with applicable law very seriously, so we provide customer data only in response to legal processes.

Second, our compliance team examines all demands very closely, and we reject them if we believe they aren’t valid. Third, we only ever comply with orders about specific accounts or identifiers, and we would not respond to the kind of blanket orders discussed in the press over the past few weeks, as the volumes documented in our most recent disclosure clearly illustrate.

Finally when we upgrade or update products legal obligations may in some circumstances require that we maintain the ability to provide information in response to a law enforcement or national security request. There are aspects of this debate that we wish we were able to discuss more freely. That’s why we’ve argued for additional transparency that would help everyone understand and debate these important issues.

In a joint statement, Shawn Turner, spokesman for the director of National Intelligence, and Judith Emmel, spokeswoman for the NSA, said:

The articles describe court-ordered surveillance – and a US company’s efforts to comply with these legally mandated requirements. The US operates its programs under a strict oversight regime, with careful monitoring by the courts, Congress and the Director of National Intelligence. Not all countries have equivalent oversight requirements to protect civil liberties and privacy.

They added: “In practice, US companies put energy, focus and commitment into consistently protecting the privacy of their customers around the world, while meeting their obligations under the laws of the US and other countries in which they operate.”

• This article was amended on 11 July 2013 to reflect information from Microsoft that it did not make any changes to Skype to allow Prism collection on or around July 2012.

Permalink • Print • Comment

March 29, 2012

New Counterorrism Guidelines Gives Authorities Vast Access to Private Info of Innocent Americans

March 25, 2012 | By Trevor Timm

On Thursday, U.S. Attorney General Eric Holder signed expansive new guidelines for terrorism analysts, allowing the National Counter Terrorism Center (NCTC) to mirror entire federal databases containing personal information and hold onto the information for an extended period of time—even if the person is not suspected of any involvement in terrorism. (Read the guidelines here ).

Despite the “terrorism” justification, the new rules affect every single American.  The agency now has free rein to, as the New York Times’ Charlie Savage put it, “retrieve, store and search information about Americans gathered by government agencies for purposes other than national security threats ” and expands the amount of time the government can keep private information on innocent individuals by a factor of ten.

From the New York Times :

The guidelines will lengthen to five years — from 180 days — the amount of time the center can retain private information about Americans when there is no suspicion that they are tied to terrorism, intelligence officials said. The guidelines are also expected to result in the center making more copies of entire databases and “data mining them” using complex algorithms to search for patterns that could indicate a threat. (emphasis ours)

Journalist Marcy Wheeler summed the new guidelines up nicely saying, “So…the data the government keeps to track our travel, our taxes, our benefits, our identity? It just got transformed from bureaucratic data into national security intelligence.”

The administration claims that the changes in the rules for the NCTC—as well as for the Office of the Director of National Intelligence (DNI), which oversees the nation’s intelligence agencies—are in response to the government’s failure to connect the dots in the so-called “underwear bomber” case at the end of 2009, yet there was no explanation of how holding onto innocent Americans’ private data for five years would have stopped the bombing attempt.

Disturbingly, “oversight” for these expansive new guidelines is being directed by the DNI’s "Civil Liberties Protection Officer" Joel Alexander, who is so concerned about Americans’ privacy and civil liberties that he, as Marcy Wheeler notes, found no civil liberties concerns with the National Security Agency’s illegal warrantless wiretapping program when he reviewed it during President George W. Bush’s administration.

As other civil liberties organizations have noted, the new guidelines are reminiscent of the Orwellian-sounding “Total Information Awareness ” program George Bush tried but failed to get through Congress in 2003—again in the name of defending the nation from terrorists. The program, as the New York Times explained , sparked an “outcry” and partially shut down Congress because it “proposed fusing vast archives of electronic records — like travel records, credit card transactions, phone calls and more — and searching for patterns of a hidden terrorist cell.”

The New York Times reported , the new NCTC guidelines “are silent about the use of commercial data — like credit card and travel records — that may have been acquired by other agencies,” but information first obtained by private corporations has ended up in federal databases before. In one example, Wired Magazine found FBI databases contained “200 million records transferred from private data brokers like ChoicePoint, 55,000 entries on customers of Wyndham hotels, and numerous other travel and commercial records.” The FBI would be one of the agencies sharing intelligence with the NCTC.

Despite Congress’ utter rejection of the “Total Information Awareness” program (TIA) in 2003, this is the second time this month the administration has been accused of instituting the program piecemeal. In his detailed report on the NSA’s new “data center” in Utah, Wired Magazine’s James Bamford remarked that the new data storage complex is “the realization” of the TIA program, as it’s expected to store and catalog “all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches.”

Unfortunately, the new NCTC guidelines are yet another example of the government using the word “terrorism” to infringe on the rights of innocent Americans. Aside from the NSA’s aforementioned warrantless wiretapping program, we have seen the Patriot Act overwhelmingly used in criminal investigations not involving terrorism, despite its original stated purpose. As PBS Frontline’s Azmat Khan noted in response to the new guidelines, investigative journalist Dana Priest has previously reported how “many states have yet to use their vast and growing anti-terror apparatus to capture any terrorists; instead the government has built a massive database that collects, stores and analyzes information on thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.” 

This problem has been well documented for years, yet Congress and both the Bush and Obama administrations have continued to use terrorism as a justification for expansive laws, and Americans’ constitutional rights have become collateral damage. 

Permalink • Print • Comment

Graduated Response Deal Steamrollers On Towards July 1 Launch

March 21, 2012 | By Parker Higgins

Last week, RIAA CEO Cary Sherman confirmed that the country's largest ISPs will voluntarily roll out by July 1 a "graduated response" program aimed at discouraging unauthorized downloading. A Memorandum of Understanding published last summer outlines the program, which was developed without user feedback . Under the new system, a rightsholder accusing an ISP subscriber of infringment will trigger a series of ever-increasing consequences . The responses are graduated in the sense that they escalate after each accusation, beginning with steps aimed at educating users about copyright and culminating in the Orwellian-sounding "mitigation measures" — bandwidth throttling or account suspension.

As we said last year, this deal is tilted against subscribers . That's not surprising, given that no one solicited subscriber input in advance. In fact, some online commenters have expressed concern that the agreement runs afoul of antitrust law .

One key problem is the arrangement shifts the burden of proof: rather than accusers proving infringement before the graduated response process starts against a subscriber, the subscriber must disprove the accusation in order to call a halt to it. Worse, accused subscribers have to defend themselves on an uneven playing field. For example, they have only ten days to prepare a defense, and with only six pre-set options available. Of course, there's no assurance that those who review the cases are neutral, and the plan sorely lacks consequences for an accuser who makes mistaken or fraudulent claims.

There are still more problems. The plan calls for "education" after the first accusations, but based on the information now available on the website launched last year by the Center for Copyright Information (the entity charged with administering the system), it's likely to be both deceptive and scare-mongering. And the whole system lacks in transparency: while it includes some minimal reporting requirements, those reports need not be made public. 

The final rub: subscribers will doubtless be paying for their own "re-education," as ISPs pass on their portions of the administration costs in the form of higher fees.

What can users do at this point? In some cases, they can vote with their feet. This agreement is voluntary for now, and while the participating ISPs include many major companies — AT&T, Verizon, Comcast, Cablevision, and Time Warner Cable — there are other options. Users lucky enough to have a choice of providers for their Internet service should consider switching to a service that opted not to "cooperate." For example, companies like Sonic and Cox Communications have a history of fighting for their users where they can, and are notably absent from this arrangement.

Otherwise, users have little choice for now but to watch their ISP roll out this new system against their interests, and maybe familiarize themselves with the six pre-approved responses available to them after an accusation. EFF will continue to follow developments in this agreement closely, and will be offering users a way to speak out against it soon. Stay tuned to updates about these actions on our EFFector mailing list , or by following EFF on Identi.ca or Twitter .

Permalink • Print • Comment

March 20, 2012

Facebook’s (In)conspicuous Absence From the Do Not Track Discussions

On the heels of President Obama's recent introduction of a Privacy Bill of Rights, the Digital Advertising Alliance (DAA), the latest self-regulatory organization for online advertising, agreed to support widespread implementation of Do Not Track (DNT) browser headers. This is a laudable step, and in the coming months the responsibilities for how websites respond to the signal will be articulated in multistakeholder meetings through the W3C's Tracking Protection Working Group . One conspicuous absence from the Do Not Track discussions is Facebook. As a company that tracks millions of users around the web, Facebook needs to follow in the footsteps of Google, Microsoft, Yahoo!, and others by committing to respect user choice.

There is no denying Facebook's popularity in the online arena. It is consistently ranked in the top five websites visited in the world. In the month of December 2011 alone, users spent more than 9.7 billion minutes per day on Facebook on personal computers, while in the mobile sphere the Facebook app is one of the most downloaded applications across the smartphone ecosystem.1 Facebook is apt to translate this popularity into effective advertising, which is fundamental to its revenue stream. Facebook said as much in its IPO documents, where it stated: "We generate substantially all of our revenue from advertising and payment processing fees."2 Facebook also provided explicit figures. In 2011, they made $3.15 billion of $3.71 billion solely from advertising.3 In combination with Facebook's dominance in social media and its engagement with both Facebook and non-Facebook users outside of Facebook.com, Facebook's reliance on advertising as a major revenue stream is a reason that Facebook should be involved in current W3C discussions about the future of online advertising.

Facebook has a complex relationship with userssometimes it acts like a social network, but other times it acts more like an online tracking company. This tracking takes place without a user ever having to interact with the Facebook "like" or "social plugin" buttons: just seeing the "like" button is enough for Facebook to collect a record of your reading habits. It was third party tracking practices similar to this that inspired the Do Not Track movement. Like other companies that engage in cross-site tracking, Facebook needs to commit to respecting the Do Not Track header.

Facebook's interaction with users is further complicated by Instant Personalization , a system that allows non-Facebook sites to embed interactive Facebook widgets and conversations. Instant Personalization inherently requires tracking. When an individual has "instant personalization" enabled in her Facebook settings and then sets the Do Not Track header, we recommend that Facebook clarify whether or not she is agreeing to opt back in to being tracked while using instant personalization. This could be done with an interstitial explaining the tracking inherent to instant personalization and asking her whether, given her preference to not be tracked, she would still like to see and use instant personalization widgets. This type of transparent privacy control can ensure that Facebook users better understand how Facebook collects data on them. These complications are all reasons for Facebook to further engage in Do Not Track discussions and the Do Not Track mechanism.

It's clear that Facebook wants to be a part of the conversation around advertising and privacy. According to AdAge , when the Commercial Privacy Bill of Rights Act (PDF) was introduced last year, Facebook sent an “army of lawyers” to Washington to convince Senators Kerry and McCain to carve out exceptions to their privacy bill so that Facebook could track its users via social widgets on other sites (dubbed the "Facebook loophole" ). Facebook currently retains two lobbying firms, and it nearly quadrupled its lobbying budget last year to $1.35 million.4 The best Internet policy arises from collaborative efforts with users, advocacy groups, and other technology companiesnot backroom deals on Capitol Hill. This is especially true when many policymakers and the public are watching online advertisers closely to see if they can improve their poor track record when it comes to self-regulation.

Currently, the W3C's Tracking Protection Working Group involves stakeholders that include privacy organizations, tracking companies, the DAA, and academics to refine what Do Not Track means and how it is implemented. Facebook's prominence in the online advertising world, its reliance on advertising as a revenue model, and its activity in Washington make it clear that Facebook should be more involved in the negotiations on advertisers' responsibilities to respect Do Not Track.

After a privacy agreement was reached with the FTC in November 2011, Mark Zuckerburg wrote : "I'm committed to making Facebook the leader in transparency and control around privacy." Do Not Track is the next step for users to control how they can be tracked and what data can be collected. It's time Facebook engage with the larger Internet community and respect the rights of users who opt out of tracking.

  • 1. Data found in Facebook's IPO documents. Documents can be found here .
  • 2. Ibid.
  • 3. Ibid.
  • 4. Data courtesy of the Center for Responsive Politics' Open Secrets. Facebook's lobbying stats can be found here .

Permalink • Print • Comment
Next Page »
Made with WordPress and a healthy dose of Semiologic • Sky Gold skin by Denis de Bernardy